4 research outputs found

    State of the Art Survey on Session Hijacking

    Get PDF
    With the advent of online banking more and more users are willing to make purchases online and doing so flourishes the online E-Business sector ever so more. Attackers are ever so vigilant and active now on web than ever to leverage the insecure web application and database that is out there on the internet to exploit. Today2019;s internet as we see are heavily integrated with sophisticated network whether it2019;s wired or wireless network. But the inherent compliancy to not integrating security while developing application leave it vulnerable to many attacks. One of the attack that has been prevalent now-a-days is: session hijacking

    A Study on the Security of Password Hashing Based on GPU Based, Password Cracking using High-Performance Cloud Computing

    Get PDF
    In This paper the current security of various password hashing schemes that are in use today will be investigated through practical proof of concept – GPU based, password hash dump cracking using the power of cloud computing. The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords

    TRUST IN SHARING ECONOMY

    Get PDF
    This research explores factors that impact people’s trust and subsequently their willingness to participate in the sharing economy and how the factors are different from those identified in e-commerce context. The study was conducted in two phases. The Phase I study was an exploratory study with openended questions. The Phase II study will be conducted to test seven hypotheses. The Phase I study revealed that the sharing economy is still in its early stage but is gaining momentum. The results indicated that the biggest inhibitor for the sharing economy might be the physical security. The evidences seem to highlight the importance of enhanced background checks on participating members as well as adoption of additional security measures such as security certificate and safety insurance
    corecore